Blog

Improve your security posture 

With Threat Intelligence’s blog you stay up to date with the latest cyber security tips and news

remote work security
By Threat Intelligence 31 Jan, 2022
There are many factors to take into consideration when staff work remotely. For any organisation, maintaining ongoing visibility over staff devices, the applications in your environment and network traffic is essential.
By Threat Intelligence 24 Jan, 2022
In this blog we will explore the benefits of embracing agile methodologies, whilst ensuring AppSec becomes an integral part of the SDLC.
By Threat Intelligence 17 Jan, 2022
In this blog, we will explore the benefits of cloud, some of the important security implications you need to consider before transitioning, and how expert guidance can help you avoid potentially devastating breaches.
Outsource cybersecurity
By Threat Intelligence 10 Jan, 2022
In this blog, we will explore how outsourcing a range of cybersecurity functions to professional and trusted partners could be the ideal solution for your organisation.
Log4j exposure
By Threat Intelligence 15 Dec, 2021
A critical vulnerability (CVSS score of 10 out of 10) is actively being exploited in the wild to execute ransomware or cryptocurrency miners across a large number of Java-based applications and products. Applications or products that use Java quite often use the Log4j library to create log entries. The vulnerability exists in any HTTP header or parameter that is logged via the Log4j library, which allows a remote attacker to perform Remote Code Execution on the underlying server. This is achieved by forcing the server to download a remotely hosted Java Class that it then executes. The vulnerability identifier for this vulnerability is CVE-2021-44228 and is dubbed the "Log4Shell" vulnerability.
Vulnerability Scanning vs Penetration Testing
By Threat Intelligence 13 Dec, 2021
In this blog, we will explore the differences between Vulnerability Scanning and Penetration Testing, as well as the many benefits your organisation can derive by combining features of both.
By Threat Intelligence 12 Oct, 2021
It is undeniable that organizations require robust security measures against cyber threats. A cyber-breach can result in huge expenses to your organization. So what can we do to help prevent these breaches? This is the purpose of a strong security architecture that can reduce these cyber security threats and the expenses that might result from them.  A security architecture is a set of models, methods, and security principles that align with your objectives, keeping your organization safe from cyber threats. Through security architecture, a business’ requirements are translated to executable security requirements. Just like architecture in construction where there is an examination of the property in such factors as climate, soil type, topography, and client preference, so must a security architect understand the network, firewalls, defences, detection systems, and many other factors.
By Threat Intelligence 04 Oct, 2021
As the cyberthreat landscape evolves at a dizzying speed, the only way organizations can stay ahead of threat actors is by prioritizing their cybersecurity programs. They must also monitor and analyze their security posture on an ongoing basis to detect, prevent and respond to threats. Here’s where a Security Operations Center (SOC) plays a vital role. SOC teams use numerous processes and tools to detect, analyze, respond to and investigate anomalous behaviour and cybersecurity incidents.  But even knowing how important the SOC is, not all organizations can set up the team in-house; they may lack the resources, skills, budget . . . there are any number of reasons why this happens. Fortunately, they can still leverage all the benefits of a SOC – with a managed SOC (or SOC as a Service).
Show More
Subscribe to Our Blog

Stay up to date with the latest
cybersecurity tips and news.

Penetration Testing Ebook
Share by:
Test Cynthia